The surveillance-as-a-service industry needs to be brought to heel

Credit to Author: Jonny Evans| Date: Fri, 24 Jun 2022 09:40:00 -0700

Here we go again: another example of government surveillance involving smartphones from Apple and Google has emerged, and it shows how sophisticated government-backed attacks can become and why there’s justification for keeping mobile platforms utterly locked down.

What has happened?

I don’t intend to focus too much on the news, but in brief it is as follows:

  • Google’s Threat Analysis Group has published information revealing the hack.
  • Italian surveillance firm RCS Labs created the attack.
  • The attack has been used in Italy and Kazakhstan, and possibly elsewhere.
  • Some generations of the attack are wielded with help from ISPs.
  • On iOS, attackers abused Apple’s enterprise certification tools that enable in-house app deployment.
  • Around nine different attacks were used.

The attack works like this: The target is sent a unique link that aims to trick them into downloading and installing a malicious app. In some cases, the spooks worked with an ISP to disable data connectivity to trick targets into downloading the app to recover that connection.

To read this article in full, please click here

Read more

Android apps with millions of downloads exposed to high-severity vulnerabilities

Credit to Author: Katie McCafferty| Date: Fri, 27 May 2022 16:00:00 +0000

Microsoft uncovered high-severity vulnerabilities in a mobile framework used by multiple large mobile service providers in pre-installed Android System apps that potentially exposed users to remote or local attacks.

The post Android apps with millions of downloads exposed to high-severity vulnerabilities appeared first on Microsoft Security Blog.

Read more

Beware – Banking Trojans using enhanced techniques to spread malware.

Credit to Author: Akshay Singla| Date: Fri, 13 May 2022 12:46:13 +0000

In our Open-Source Threat Hunting, Quick Heal Security Researchers encountered a banking Trojan named Aberebot capable of stealing…

The post Beware – Banking Trojans using enhanced techniques to spread malware. appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read more

Beware – Banking Trojans using enhanced techniques to spread malicious malware.

Credit to Author: Akshay Singla| Date: Fri, 13 May 2022 12:46:13 +0000

In our Open-Source Threat Hunting, Quick Heal Security Researchers encountered a banking Trojan named Aberebot capable of stealing…

The post Beware – Banking Trojans using enhanced techniques to spread malicious malware. appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read more

How to remove Google from your life

Credit to Author: David Ruiz| Date: Mon, 09 May 2022 14:35:14 +0000

Google and all its products can dominate the average person’s life. Here’s an in-depth guide on how to remove yourself from their ecosystem.

The post How to remove Google from your life appeared first on Malwarebytes Labs.

Read more